O Level Exam
Menu mobile
Home
MCQ Topic Wise
INFORMATION TECHNOLOGY TOOLS AND NETWORK BASIS
New
WEB DESIGNING AND PUBLISHING
New
PROGRAMMING AND PROBLEM SOLVING THROUGH PYTHON
New
INTERNET OF THINGS AND ITS APPLICATIONS
New
Online Mock Test
INFORMATION TECHNOLOGY TOOLS AND NETWORK BASIS
New
WEB DESIGNING AND PUBLISHING
New
PROGRAMMING AND PROBLEM SOLVING THROUGH PYTHON
New
INTERNET OF THINGS AND ITS APPLICATIONS
New
Old Papers
Practical Questions
Projects
True/False Questions : OVERVIEW OF FUTURE SKILLS AND CYBER SECURITY For NIELIT O Level Exam
OVERVIEW OF FUTURE SKILLS AND CYBER SECURITY For NIELIT O Level Exam
00:00:00
English
Hindi
Question No# :
01
out of 20
Report Bug
Attacks on confidentiality is not a type of cyber attacks
गोपनीयता पर हमला एक प्रकार का साइबर हमला नहीं है
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
02
out of 20
Report Bug
Ripping is the process of copying data from CD to Hard disk.
Ripping is the process of copying data from CD to Hard disk.
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
03
out of 20
Report Bug
Robotics is also a major field related to Artificial intelligence
Robotics is also a major field related to Artificial intelligence
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
04
out of 20
Report Bug
Buying legal software from reputed retailers or organizations is a way to stop Software Piracy.
Buying legal software from reputed retailers or organizations is a way to stop Software Piracy.
A.
TRUE
B.
FALSE
Question No# :
05
out of 20
Report Bug
Can I Make Money Through Blogging?
ब्लॉगिंग के माध्यम से पैसे कमाए जा सकते हैं?
A.
TRUE
B.
FALSE
Question No# :
06
out of 20
Report Bug
A firewall may be implemented in router in router which connect intranet to internet
A firewall may be implemented in router in router which connect intranet to internet
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
07
out of 20
Report Bug
Bar Code and QR Code the same?
Bar Code and QR Code एक समान होते हैं ?
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
08
out of 20
Report Bug
Hacking a computer is always illegal and punishable by law.
कंप्यूटर को हैक करना हमेशा कानून द्वारा अवैध और दंडनीय है
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
09
out of 20
Report Bug
Backup your files regularly to prevent cyber security attacks
साइबर सुरक्षा हमलों को बचने के लिए नियमित रूप से अपनी फ़ाइलों का बैकअप लेना चहिये
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
10
out of 20
Report Bug
Digital signatures develop two types of key one Private key and second Public key that are mathematically linked
Digital signatures develop two types of key one Private key and second Public key that are mathematically linked
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
11
out of 20
Report Bug
Flash memory is nonvolatile and often used in digital camera and cell phones
फ्लैश मेमोरी नॉन वोलेटाइल है और अक्सर डिजिटल कैमरा और सेल फोनमें उपयोग की जाती है?
A.
TRUE
B.
FALSE
Question No# :
12
out of 20
Report Bug
Spware monitors user activity on internet and transmit that information in the background to someone else
Spware monitors user activity on internet and transmit that information in the background to someone else
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
13
out of 20
Report Bug
GSTIN service is the part of other services tab using Net banking?
GSTIN सेवा नेटबैंकिंग का उपयोग करके वाली अन्य सेवाओं के टैब का हिस्सा है?
A.
TRUE
B.
FALSE
Question No# :
14
out of 20
Report Bug
The certificate authority signs the digital certificate with it’s own Private key
The certificate authority signs the digital certificate with it’s own Private key
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
15
out of 20
Report Bug
Firewall protects an organization’s computer systems from external access
फ़ायरवॉल किसी संगठन के कंप्यूटर सिस्टम को बाहरी पहुँच से बचाता है
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
16
out of 20
Report Bug
Phone security is the practice of defending mobile devices against a wide range of cyber attack.
Phone security is the practice of defending mobile devices against a wide range of cyber attack.
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
17
out of 20
Report Bug
Right to Privacy are given to authors of literary and artistic works such as books and other writings, musical compositions, paintings, sculpture, computer programs and films.
Right to Privacy are given to authors of literary and artistic works such as books and other writings, musical compositions, paintings, sculpture, computer programs and films.
A.
TRUE
B.
FALSE
Question No# :
18
out of 20
Report Bug
Phishing is form of fraud where fraudulent emails are set from reputable sources
Phishing is form of fraud where fraudulent emails are set from reputable sources
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
19
out of 20
Report Bug
Mixed Reality Experience Combines Elements From Virtual Reality And Augmented Reality?
मिश्रित वास्तविकता, अनुभव आभासी वास्तविकता और संवर्धित वास्तविकता से तत्वों को जोडती है?
A.
TRUE
B.
FALSE
Question No# :
20
out of 20
Report Bug
Push technology enables news and other content providers to automatically supply subscribers with information by downloading content to the user’s desktop.
Push technology enables news and other content providers to automatically supply subscribers with information by downloading content to the user’s desktop.
A.
TRUE
B.
FALSE
CCC Online Test 2021
CCC Practice Test Hindi
Python Programming Tutorials
Best Computer Training Institute in Prayagraj (Allahabad)
Best Java Training Institute in Prayagraj (Allahabad)
Best Python Training Institute in Prayagraj (Allahabad)
O Level NIELIT Study material and Quiz
Bank SSC Railway TET UPTET Question Bank
career counselling in allahabad
Sarkari Naukari Notification
Best Website and Software Company in Allahabad
Website development Company in Allahabad